Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CX XSRF @ or-reserve.php [master] #93

Open
cxronen opened this issue Jun 30, 2021 · 0 comments
Open

CX XSRF @ or-reserve.php [master] #93

cxronen opened this issue Jun 30, 2021 · 0 comments

Comments

@cxronen
Copy link
Owner

cxronen commented Jun 30, 2021

XSRF issue exists @ or-reserve.php in branch master

Method <?php at line 17 of or-reserve.php gets a parameter from a user request from _POST. This parameter value flows through the code and is eventually used to access application state altering functionality. This may enable Cross-Site Request Forgery (XSRF).

Severity: Medium

CWE:352

Checkmarx

Training
Recommended Fix

Lines: 16 17 19 26 45 15


Code (Line #16):

	$roomid = filter_var((isset($_POST["roomid"])?$_POST["roomid"]:""), FILTER_SANITIZE_NUMBER_INT);

Code (Line #17):

	$starttime = filter_var((isset($_POST["starttime"])?$_POST["starttime"]:""), FILTER_SANITIZE_NUMBER_INT);

Code (Line #19):

	$capacity = filter_var((isset($_POST["capacity"])?$_POST["capacity"]:""), FILTER_SANITIZE_NUMBER_INT);

Code (Line #26):

	$altusername = (isset($_POST["altusername"])?$_POST["altusername"]:"");

Code (Line #45):

				$ofvalues[$optionalfield["optionformname"]] = mysql_real_escape_string(isset($_POST[$optionalfield["optionformname"]])?$_POST[$optionalfield["optionformname"]]:"");

Code (Line #15):

	$duration = filter_var((isset($_POST["duration"])?$_POST["duration"]:""), FILTER_SANITIZE_NUMBER_INT);

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant